To see the other types of publications on this topic, follow the link: Biometric data.

Dissertations / Theses on the topic 'Biometric data'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Biometric data.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

McNulty, Peggy Sue. "Values issues in biometric data collection." Connect to Electronic Thesis (CONTENTdm), 2009. http://worldcat.org/oclc/525070842/viewonline.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ugail, Hassan, and Eyad Elyan. "Efficient 3D data representation for biometric applications." IOS Press, 2007. http://hdl.handle.net/10454/2683.

Full text
Abstract:
Yes
An important issue in many of today's biometric applications is the development of efficient and accurate techniques for representing related 3D data. Such data is often available through the process of digitization of complex geometric objects which are of importance to biometric applications. For example, in the area of 3D face recognition a digital point cloud of data corresponding to a given face is usually provided by a 3D digital scanner. For efficient data storage and for identification/authentication in a timely fashion such data requires to be represented using a few parameters or variables which are meaningful. Here we show how mathematical techniques based on Partial Differential Equations (PDEs) can be utilized to represent complex 3D data where the data can be parameterized in an efficient way. For example, in the case of a 3D face we show how it can be represented using PDEs whereby a handful of key facial parameters can be identified for efficient storage and verification.
APA, Harvard, Vancouver, ISO, and other styles
3

Lam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 81).
Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggregate this perpetual growth of biometric "big" data, Apple HealthKit, Google Fit, and Samsung SAMI were each created with the hope of becoming the dominant design platform for Digital Health-Data. The research for this paper consists of citings from technology strategy literature and relevant journalism articles regarding recent and past developments that pertain to the wearables market and the digitization movement of electronic health records (EHR) and protected health information (PHI) along with their rules and regulations. The culmination of these citations will contribute to my hypothesis where the analysis will attempt to support my recommendations for Apple, Google, and Samsung. The ending chapters will encompass discussions around network effects and costs associated with multi-homing user data across multiple platforms and finally ending with my conclusion based on my hypothesis.
by Lawrence G. Lam.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
4

Stevenson, Brady Roos. "Analysis of Near-Infrared Phase Effects on Biometric Iris Data." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1299.

Full text
Abstract:
The purpose of this research is to ascertain potential iris scan data variations from near infrared waves derived from fluorescent illumination. Prior studies of iris data variances from infrared wave interference of halogen, incandescent, and sunlight with iris cameras suggest that similar changes may exist under near infrared wavelengths from fluorescent light. The concern is that the fluorescent energy emission may interfere with the near infrared detection of an iris camera. An iris camera is used to measure human eye characteristics known as biometrics. If such infrared emission is statistically significant, then it can alter the validity of the iris scan data. The experiment utilized nine hundred forty-five (945) scans from sixty-three (63) subjects. Measured results showed increased heat from ambient fluorescent illumination does not statistically alter the biometric readings of human eyes. The test results fail to reject that data loss will not occur as heat is increased in the ambient fluorescent light source.
APA, Harvard, Vancouver, ISO, and other styles
5

Khanna, Tania. "Low power data acquisition for microImplant biometric monitoring of tremors." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78448.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 97-100).
In recent years, trends in the medical industry have created a growing demand for implantable medical devices. In particular, the need to provide doctors a means to continuously monitor biometrics over long time scales with increased precision is paramount to efficient healthcare. To make medical implants more attractive, there is a need to reduce their size and power consumption. Small medical implants would allow for less invasive procedures, greater comfort for patients, and increased patient compliance. Reductions in power consumption translate to longer battery life. The two primary limitations to the size of small medical implants are the batteries that provide energy to circuit and sensor components and the antennas that enable wireless communication to terminals outside of the body. The theory is applied in the context of the long term monitoring of Parkinson's tremors. This work investigates how to reduce the amount of data needing to acquire a signal by applying compressive sampling thereby alleviating the demand on the energy source. A low energy SAR ADC is designed using adiabatic charging to further reduce energy usage. This application is ideal for adiabatic techniques because of the low frequency of operation and the ease with which we can reclaim energy from discharging the capacitors. Keywords: SAR ADC, adiabatic, compressive sampling, biometric, implants
by Tania Khanna.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
6

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Full text
Abstract:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
APA, Harvard, Vancouver, ISO, and other styles
7

Pisani, Paulo Henrique. "Biometrics in a data stream context." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.

Full text
Abstract:
The growing presence of the Internet in day-to-day tasks, along with the evolution of computational systems, contributed to increase data exposure. This scenario highlights the need for safer user authentication systems. An alternative to deal with this is by the use of biometric systems. However, biometric features may change over time, an issue that can affect the recognition performance due to an outdated biometric reference. This effect can be called as template ageing in the area of biometrics and as concept drift in machine learning. It raises the need to automatically adapt the biometric reference over time, a task performed by adaptive biometric systems. This thesis studied adaptive biometric systems considering biometrics in a data stream context. In this context, the test is performed on a biometric data stream, in which the query samples are presented one after another to the biometric system. An adaptive biometric system then has to classify each query and adapt the biometric reference. The decision to perform the adaptation is taken by the biometric system. Among the biometric modalities, this thesis focused on behavioural biometrics, particularly on keystroke dynamics and on accelerometer biometrics. Behavioural modalities tend to be subject to faster changes over time than physical modalities. Nevertheless, there were few studies dealing with adaptive biometric systems for behavioural modalities, highlighting a gap to be explored. Throughout the thesis, several aspects to enhance the design of adaptive biometric systems for behavioural modalities in a data stream context were discussed: proposal of adaptation strategies for the immune-based classification algorithm Self-Detector, combination of genuine and impostor models in the Enhanced Template Update framework and application of score normalization to adaptive biometric systems. Based on the investigation of these aspects, it was observed that the best choice for each studied aspect of the adaptive biometric systems can be different depending on the dataset and, furthermore, depending on the users in the dataset. The different user characteristics, including the way that the biometric features change over time, suggests that adaptation strategies should be chosen per user. This motivated the proposal of a modular adaptive biometric system, named ModBioS, which can choose each of these aspects per user. ModBioS is capable of generalizing several baselines and proposals into a single modular framework, along with the possibility of assigning different adaptation strategies per user. Experimental results showed that the modular adaptive biometric system can outperform several baseline systems, while opening a number of new opportunities for future work.
A crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
APA, Harvard, Vancouver, ISO, and other styles
8

Pratt, Jamie M. "The Effects of Worksite Health Promotion Programs on Employee Biometric Data." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5752.

Full text
Abstract:
INTRODUCTION: Worksite health promotion programs (WHPP) promote maintenance and changes of health-related behaviors of employees. Some companies opt to contract with a third party provider to implement a WHPP. PURPOSE: This study evaluated the participation rates, availability and use of health coaching, and changes in biometric data over a 2-year time period of employees in 13 companies for whom the WHPP was implemented by Wellness Corporate Solutions (WCS). METHODS: We had 2 years of biometric, health risk appraisal (HRA), or health coaching data on 4,473 employees. The statistical analysis included biometric screening data (percent body fat, body mass index (BMI), total cholesterol (TC), high- and low-density lipoproteins (HDL-C, LDL-C), TC/HDL ratio, triglycerides, glucose, systolic and diastolic blood pressures (SBP and DBP)) from all 13 companies and health coaching data from five companies. RESULTS: Employee participation rates of the 13 companies ranged from 35% to 75%. Five of the 13 companies provided voluntary telephonic health coaching to employees participating in their WHPPs. Of those employees for which we had 2-year data, 125 (12.9%) actually participated in health coaching. Only one of the 13 companies demonstrated improvement in all 10 biometric measurements and 1 company demonstrated improvement in only one biometric measurement. The biometric measurements that showed the greatest improvements over time were triglycerides, blood pressure, BMI, and TC. There was no association found between the number of variables that improved and employee participation rate (p = 0.8814) or the type of incentives offered to employees (p = 0.1389). Availability and use of health coaching did not appear to affect the number of variables that improved. Compared to employees who did not use health coaching, there were significantly greater changes in DBP, HDL-C, and BMI (p < 0.05) in employees who used health coaching. The magnitude of change in variables of interest was dependent, in part, on the baseline value. CONCLUSIONS: Voluntary participation in WHPPs results in positive changes in health-related biometric variables. Health coaching can positively affect the magnitude of change in some biometric variables and the magnitude of change is likely related to the baseline value and the frequency of coaching interactions. Further research should evaluate the benefits of various forms and frequencies of health coaching. Worksite health promotion programs and health coaching may also have a positive impact on other variables (e.g., employee attitudes and morale) not addressed in this study.
APA, Harvard, Vancouver, ISO, and other styles
9

Aronsson, Erik. "Biometric Authentication and Penetration of Smartphones." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.

Full text
Abstract:
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognition systems of the examined smartphones.The result of the experiments showed significant differences between the differentsmartphones, where some exhibited flawless security and others showed significantsecurity flaws. Both fingerprint and face recognition systems were successfullycircumvented, while none of the iris recognition systems were breached. No clearlink could be observed between the cost of the device and success rate of attacks,while only devices using the Android operating system were breached. The resultsundeniably showed that some smartphones are vulnerable to the employed tech-niques. It also showed that some of the tested devices had managed to implementmeasures to counteract the applied presentation attacks. The root cause of thevulnerabilities showcased in the experiment is due to the fact that biometric traitscan be copied and reproduced, highlighting a basic flaw of such systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Sinsel, Adam R. "Supporting the maritime information dominance: optimizing tactical network for biometric data sharing in maritime interdiction operations." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45257.

Full text
Abstract:
Approved for public release; distribution is unlimited
This research intends to improve information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance. Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with varied antenna selection, radio power, and frequency specifications, and two specific methods of integrating Department of Defense biometric collection devices to the wireless MANET, which utilizes a single (WR) MPU4 802.11 Wi-Fi access point to connect secure electronic enrollment kit II (SEEK II) biometric devices to the MANET, and tethers each SEEK device to a dedicated WR using a personal Ethernet connection. Biometric data is shared across the tactical network and transmitted to remote servers. Observations and analysis regarding network performance demonstrate that wireless MANETs can be optimized for biometric reach back and integrated with biometric devices to improve biometric data sharing in MIO.
APA, Harvard, Vancouver, ISO, and other styles
11

Blommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.

Full text
Abstract:

Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.

Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.

In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.

The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.

Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.

Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.

APA, Harvard, Vancouver, ISO, and other styles
12

Brobeck, Stefan, and Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.

Full text
Abstract:

Biometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.

The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.

There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.

We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.

Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.


Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.

Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.

Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.

Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.

Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.

APA, Harvard, Vancouver, ISO, and other styles
13

Giesing, Ilse. "User perception related to identification through biometrics within electronic business." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jašková, Jitka. "Zpracování osobních údajů v rámci EU se zřetelem na policejní a justiční spolupráci." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-18247.

Full text
Abstract:
The thesis deals with the approach level, meaning, purpose and benefit of personal data protection in their processing within police and judicial cooperation in the EU. In the introduction the fundamental issues of personal data protection in the context of the EU and the Czech republic are defined, focusing on terminology and explanations of current issues, particularly the area of biometric data and data retention. Extra attention is also given to the conflict of the right to privacy, and the related right to personal data protection and protection of public interests and safety. After that the thesis deals with a performing of police and judicial cooperation in the EU through specific subjects, in particular Europol and Eurojust. The final part of the thesis focuses on the practical implementation of personal data protection in police and judicial cooperation in the EU, and secondly the importance of personal data protection in police and judicial cooperation, as a deduced basic human right, and the difficulties with which the personal data protection in police and judicial cooperation in the EU are joined. The final part of this thesis consider the main sections in which we can find area for adjustment towards more effective police and judicial cooperation in the EU, with full respect for the right to personal data protection.
APA, Harvard, Vancouver, ISO, and other styles
15

Li, Jiawei. "Person re-identification with limited labeled training data." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.

Full text
Abstract:
With the growing installation of surveillance video cameras in both private and public areas, it is an immediate requirement to develop intelligent video analysis system for the large-scale camera network. As a prerequisite step of person tracking and person retrieval in intelligent video analysis, person re-identification, which targets in matching person images across camera views is an important topic in computer vision community and has been received increasing attention in the recent years. In the supervised learning methods, the person re-identification task is formulated as a classification problem to extract matched person images/videos (positives) from unmatched person images/videos (negatives). Although the state-of-the-art supervised classification models could achieve encouraging re-identification performance, the assumption that label information is available for all the cameras, is impractical in large-scale camera network. That is because collecting the label information of every training subject from every camera in the large-scale network can be extremely time-consuming and expensive. While the unsupervised learning methods are flexible, their performance is typically weaker than the supervised ones. Though sufficient labels of the training subjects are not available from all the camera views, it is still reasonable to collect sufficient labels from a pair of camera views in the camera network or a few labeled data from each camera pair. Along this direction, we address two scenarios of person re-identification in large-scale camera network in this thesis, i.e. unsupervised domain adaptation and semi-supervised learning and proposed three methods to learn discriminative model using all available label information and domain knowledge in person re-identification. In the unsupervised domain adaptation scenario, we consider data with sufficient labels as the source domain, while data from the camera pair missing label information as the target domain. A novel domain adaptive approach is proposed to estimate the target label information and incorporate the labeled data from source domain with the estimated target label information for discriminative learning. Since the discriminative constraint of Support Vector Machines (SVM) can be relaxed into a necessary condition, which only relies on the mean of positive pairs (positive mean), a suboptimal classification model learning without target positive data can be those using target positive mean. A reliable positive mean estimation is given by using both the labeled data from the source domain and potential positive data selected from the unlabeled data in the target domain. An Adaptive Ranking Support Vector Machines (AdaRSVM) method is also proposed to improve the discriminability of the suboptimal mean based SVM model using source labeled data. Experimental results demonstrate the effectiveness of the proposed method. Different from the AdaRSVM method that using source labeled data, we can also improve the above mean based method by adapting it onto target unlabeled data. In more general situation, we improve a pre-learned classifier by adapting it onto target unlabeled data, where the pre-learned classifier can be domain adaptive or learned from only source labeled data. Since it is difficult to estimate positives from the imbalanced target unlabeled data, we propose to alternatively estimate positive neighbors which refer to data close to any true target positive. An optimization problem for positive neighbor estimation from unlabeled data is derived and solved by aligning the cross-person score distributions together with optimizing for multiple graphs based label propagation. To utilize the positive neighbors to learn discriminative classification model, a reliable multiple region metric learning method is proposed to learn a target adaptive metric using regularized affine hulls of positive neighbors as positive regions. Experimental results demonstrate the effectiveness of the proposed method. In the semi-supervised learning scenario, we propose a discriminative feature learning using all available information from the surveillance videos. To enrich the labeled data from target camera pair, image sequences (videos) of the tagged persons are collected from the surveillance videos by human tracking. To extract the discriminative and adaptable video feature representation, we propose to model the intra-view variations by a video variation dictionary and a video level adaptable feature by multiple sources domain adaptation and an adaptability-discriminability fusion. First, a novel video variation dictionary learning is proposed to model the large intra-view variations and solved as a constrained sparse dictionary learning problem. Second, a frame level adaptable feature is generated by multiple sources domain adaptation using the variation modeling. By mining the discriminative information of the frames from the reconstruction error of the variation dictionary, an adaptability-discriminability (AD) fusion is proposed to generate the video level adaptable feature. Experimental results demonstrate the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
16

Ara?jo, Rayron Victor Medeiros de. "A probabilistic analysis of the biometrics menagerie existence: case study in fingerprint data." Universidade Federal do Rio Grande do Norte, 2016. http://repositorio.ufrn.br/handle/123456789/21032.

Full text
Abstract:
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-07-22T15:02:53Z No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5)
Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-07-27T00:08:32Z (GMT) No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5)
Made available in DSpace on 2016-07-27T00:08:32Z (GMT). No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5) Previous issue date: 2016-02-18
At? pouco tempo atr?s o uso de biometria se restringia a ambientes de alta seguran?a e aplica??es de identifica??o criminal por raz?es de natureza econ?mica e tecnol?gica. Contudo, nos ?ltimos anos a autentica??o biom?trica come?ou a fazer parte do dia a dia das pessoas. Desde ent?o, alguns problemas de autentica??o entraram em evid?ncia, como a impossibilidade de votar numa elei??o porque o indiv?duo n?o tinha sua impress?o digital reconhecida. Isso acontece, pois os usu?rios de um sistema biom?trico podem ter diferentes graus de acur?cia, principalmente em sistemas de utiliza??o em larga escala. Alguns desses usu?rios podem ter dificuldade na autentica??o, enquanto outros podem ser, particularmente, vulner?veis ? imita??o. Estudos recentes investigaram e identificaram esses tipos de usu?rios, dando-lhes nomes de animais: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms e Phantoms. O objetivo desse trabalho ? avaliar a exist?ncia desses tipos de usu?rios em uma base de dados de impress?es digitais e propor uma nova forma de investig?-los, baseando-se no desempenho das verifica??es entre amostras. Nossos resultados identificaram a presen?a de goats, lambs, wolves, chameleons e phantoms, al?m de demonstrar a aus?ncia de worms e doves, em um sistema biom?trico proposto.
Until recently the use of biometrics was restricted to high-security environments and criminal identification applications, for economic and technological reasons. However, in recent years, biometric authentication has become part of daily lives of people. The large scale use of biometrics has shown that users within the system may have different degrees of accuracy. Some people may have trouble authenticating, while others may be particularly vulnerable to imitation. Recent studies have investigated and identified these types of users, giving them the names of animals: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms and Phantoms. The aim of this study is to evaluate the existence of these users types in a database of fingerprints and propose a new way of investigating them, based on the performance of verification between subjects samples. Once introduced some basic concepts in biometrics and fingerprint, we present the biometric menagerie and how to evaluate them.
APA, Harvard, Vancouver, ISO, and other styles
17

Giersberg, Mona Franziska [Verfasser]. "Collection of biometric data as an animal based approach for the assessment of minimum space requirements in livestock farming / Mona Franziska Giersberg." Hannover : Bibliothek der Tierärztlichen Hochschule Hannover, 2017. http://d-nb.info/1136159762/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.

Full text
Abstract:
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to be extraneous, the positive impact is greater than the downfalls.
Passenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
APA, Harvard, Vancouver, ISO, and other styles
19

Giesa, Anette Isabella. "Play for the Black Box — Using Critical Play to raise awareness of data privacy issues." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23959.

Full text
Abstract:
In the development of digitally connected solutions that require the use of personal data, the issue of data privacy is an important factor that must be taken into account. Simply informing users about how data is used and getting their consent with a simple click is not enough to create awareness of the issue of data privacy and let them make a conscious decision about the use of their personal data. Furthermore, there is a big gap in knowledge about what personal data is and what is considered sensitive data. Especially the knowledge about what biometric identifiers that they are used in a variety of everyday life applications and in which sense the handling can be problematic is unknown.This thesis project explores how the use of critical play in form of an activist game can create awareness of the issue of data privacy, inform about the value of biometric data and foster self-reflection of handling one’s own personal data. Through the simulation of dependencies between personal data, the motivation to share them and the aggregation of personal data in combination with real and prospective use cases, players are empowered to reflect on their behaviour and to critically deal with the topic of data privacy.
APA, Harvard, Vancouver, ISO, and other styles
20

Costa, Leandro Garcia da. "Crescimento, desenvolvimento e consumo hídrico de cana-de-açúcar sob dois sistemas de manejo da palha." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/11/11152/tde-23012017-150113/.

Full text
Abstract:
A determinação da quantidade ideal de palha sobre o solo é uma das questões mais discutidas pelo setor sucroenergético, visto que este resíduo vegetal pode ser considerado um subproduto da cana-de-açúcar destinado à produção de etanol celulósico e cogeração de energia elétrica. Para estabelecer estes valores é necessário considerar as necessidades da cultura, juntamente com características físico-químicas e biológicas do solo. Os modelos de culturas baseados em processos (MCPs), especificamente o APSIM-Sugar, capaz de simular a matéria orgânica sobre o solo, pode ser utilizado em conjunto com experimentos de campo, para auxiliar as tomadas de decisão sobre quais as quantidades ideais de palha em cada sistema de produção de cana-de-açúcar no Brasil. Os MCPs devem ser utilizados para simular o desenvolvimento e o crescimento da cultura, além do balanço de água, nitrogênio e carbono no solo, o que possibilitaria a aplicação dos resultados experimentais em outras regiões de interesse, permitindo visão e compreensão mais amplas das principais questões do setor. Neste contexto, este estudo comparou dois tratamentos: manutenção de 100% da palha (CP) e remoção de 100% da palha (SP) em um experimento irrigado conduzido com a primeira soca da cultivar RB867515, cultivada na região meridional do Brasil, no município de Piracicaba, Estado de São Paulo, Lat. 22,67° S and Long. 47,64° W. Foram realizadas avaliações biométricas mensais, referentes as variáveis, perfilhamento, altura e diâmetro de colmos, índice de área foliar (IAF) e número de folhas verdes, assim como avaliações sobre as massas frescas e secas de folhas, colmos e palmitos. A evapotranspiração da cultura (ETc), foi obtida pelo método da razão de Bowen (MRB) e a partir da reflectometria no domínio da frequência (FDR). O fluxo de seiva pelo método do balanço de calor foi assumido como a transpiração (Tp). Comparando os tratamentos, observou-se diferenças significativas apenas para no IAF e na massa seca de folhas (MSF). A ETc mostrou valores entre 3 e 8 mm dia-1, dependendo das condições climáticas e do estágio da cultura. O coeficiente de cultivo (Kc) apresentou relação inversa com a evapotranspiração de referência (ETo), de tal forma que quando ETo < 2 mm, o Kc(SP) = 1,8 e o Kc(CP) = 1,5, e para situações com ETo > 6mm foram observados Kc(CP) = 1,3 e Kc(SP) = 1,2. O modelo de cultura APSIM-Sugar foi aplicado para diferentes regiões brasileiras, visando a determinação das melhores estratégias de manejo, tanto de água, quanto de solo. As simulações mostraram que, para todas as regiões, a manutenção de no mínimo 50% da palha e a reposição de 25% do total de irrigação, resultou nas maiores taxas de incremento da produtividade da cana-de-açúcar.
Determining the optimal amount of trash blankets above ground is one of the most discussed issues by the sugarcane industry, since this residue can be considered a byproduct of sugarcane due to cellulosic ethanol and electricity cogeneration. To establish these values, it is necessary to consider the crop needs together with physical, chemical and biological soil characteristics. The process based crop models (PBCMs), specifically APSIM-Sugar, able to simulate the soil organic matter, can be used in conjunction with field experiments to support the decision making about the optimum amounts of trash blanket for Brazilian sugarcane farming systems. PBCMs might be used to simulate the crop development and growth, water, nitrogen and carbon soil balances, and make the experiment data applicable for other regions allowing for a broader view and understanding on the key questions. In this context, this study compared two treatments: maintenance of 100% of the trash (CP) and removal of 100% of the trash (SP) in an experiment carried out with an irrigated first ratoon of RB867515 cultivar in Southern Brazil, at city of Piracicaba, State of São Paulo, Lat. 22,67° S and Long. 47,64° W. Monthly biometric evaluations were performed regarding the variables, tillering, stalk\'s height and diameter, leaf area index (LAI) and number of green leaves, as well as fresh and dry mass of leaves, cabbages and stalks. Crop evapotranspiration (ETc) were assessed by Bowen ratio method (MRB) and frequency domain reflectometry (FDR). Sap flow measured by heat balance method was assumed to be the crop transpiration (Tp). APSIM-Sugar crop model was calibrated based on these experimental data, and such model was applied for different Brazilian regions for evaluating the best water-trash management strategies for each region. Comparing both treatments there were just significant differences for leaf area index (LAI) and leaves dry mass (MSF). ETc was ranged from 3 to 8 mm day-1, depending on the weather conditions and crop stage. Crop coefficient (Kc) showed an inverse linear relationship with reference evapotranspiration (ETo), in such way that when ETo < 2 mm, the Kc(SP) = 1,8 and Kc(CP) = 1,5, and for ETo > 6mm it was observed Kc(CP) = 1,3 and Kc(SP) = 1,2. APSIM-Sugar simulations showed that, in the most part of cases, the keeping at least 50% of trash blanket and 25% of total irrigation requirement, resulted on the highest yield rates.
APA, Harvard, Vancouver, ISO, and other styles
21

Gustavsson, Linnéa. "Ansiktsrekonstruktion : Mannen från den medeltida kyrkoruinen S:t Hans, Visby." Thesis, Uppsala universitet, Arkeologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-386062.

Full text
Abstract:
Facial reconstructions, like archaeology, consists of many layers that one must get through to understand the whole picture. The development of the methods that reconstructions rely on, occurred during the 20th century. By focusing on the various elements such as studies of tissue depth, chemical processes (DNA and isotope analysis), solid craftsmanship and the development of computer technology, researchers around the world have been able to build a method that can give us an extended understanding of history. However, a lot of opinions have risen for the subject, people begin to question it ́s accuracy and what the real purpose really is. Besides the reliability of facial reconstruction, the experience of how a facial reconstruction is perceived by another person is equally important, the ethical principles have been brought up to discussion because it involves human remains. Discussions may occur during cases when facial reconstructions are inevitable, one example could be with minority groups that have a different view on how a body should be handled and treated after death. These scenarios are more likely to develop in the identification in forensic contexts, but the problem may also increase in archaeological contexts if the remains are from more recent times and the individuals as a population group has suffered repression. Therefore, this paper aims to discuss such questions but also embark on a mission to perform a facial reconstruction of an individual from the medieval church of St. Hans and the challenges that may occur during the way. The American method used in this essay shows that you can get a good result by following the instructions and guidelines that are displayed in various books and articles.
APA, Harvard, Vancouver, ISO, and other styles
22

Дмитерко, Василь Миколайович, and Vasyl Dmyterko. "дослідження систем підтримки прийняття рішень в біометричних системах аутентифікації." Thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2017. http://elartu.tntu.edu.ua/handle/123456789/19006.

Full text
Abstract:
Дипломна робота присвячена дослідженню систем підтримки прийняття рішень в біометричних системах аутентифікації. Удосконалення полягає у розробці способу виділення біометричних параметрів на основі контрольних точок обличчя. Також виконано огляд основних принципів та методів біометричної аутентифікації та ідентифікації, огляд біометричних способів аутентифікації людини за рисами обличчя, а також наведено відомості про існуючі системи ідентифікації та програми для аутентифікації по обличчю. Було досліджено зразки у вигляді цифрових фото людини та на їх основі розроблено спосіб виділення біометричних ознак.
The improvement is in the development of an allocation method for biometric parameters that are based on the face control points. It was also reviewed some basic principles and methods of biometric authentication and identification, biometric methods of human authentication by facial features, and it was provided the information about the existing identification systems and face authentication software. The digital photo samples of a person were studied and the biometric features selection method was developed based on those samples.
APA, Harvard, Vancouver, ISO, and other styles
23

Koppikar, Samir Dilip. "Privacy Preserving EEG-based Authentication Using Perceptual Hashing." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc955127/.

Full text
Abstract:
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks. However, EEG signals carry a wealth of information about an individual and can reveal private information about the user. This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals. This thesis proposes a privacy-preserving EEG-based authentication system that preserves the privacy of the user by not revealing the raw EEG signals while allowing the system to authenticate the user accurately. In that, perceptual hashing is utilized and instead of raw EEG signals, their perceptually hashed values are used in the authentication process. In addition to describing the authentication process, algorithms to compute the perceptual hash are developed based on two feature extraction techniques. Experimental results show that an authentication system using perceptual hashing can achieve performance comparable to a system that has access to raw EEG signals if enough EEG channels are used in the process. This thesis also presents a security analysis to show that perceptual hashing can prevent information leakage.
APA, Harvard, Vancouver, ISO, and other styles
24

Lodrová, Dana. "Bezpečnost biometrických systémů." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-261226.

Full text
Abstract:
Hlavním přínosem této práce jsou dva nové přístupy pro zvýšení bezpečnosti biometrických systémů založených na rozpoznávání podle otisků prstů. První přístup je z oblasti testování živosti a znemožňuje použití různých typů falešných otisků prstů a jiných metod oklamání senzoru v průběhu procesu snímání otisků. Tento patentovaný přístup je založen na změně barvy a šířky papilárních linií vlivem přitlačení prstu na skleněný podklad. Výsledná jednotka pro testování živosti může být integrována do optických senzorů.  Druhý přístup je z oblasti standardizace a zvyšuje bezpečnost a interoperabilitu procesů extrakce markantů a porovnání. Pro tyto účely jsem vytvořila metodologii, která stanovuje míry sémantické shody pro extraktory markantů otisků prstů. Markanty nalezené testovanými extraktory jsou porovnávány oproti Ground-Truth markantům získaným pomocí shlukování dat poskytnutých daktyloskopickými experty. Tato navrhovaná metodologie je zahrnuta v navrhovaném dodatku k normě ISO/IEC 29109-2 (Amd. 2 WD4).
APA, Harvard, Vancouver, ISO, and other styles
25

Madsen, Angelica, and Carl Nymanson. "Bör du v(AR)a rädd för framtiden? : En studie om The Privacy Paradox och potentiella integritetsrisker med Augmented Reality." Thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43868.

Full text
Abstract:
I en tid där digitaliseringen är mer utbredd än någonsin ökar också mängden data som samlas och delas online. I takt med att nya tekniker utvecklas öppnas det upp för nya utmaningar för integritetsfrågor. En aktiv användare online ägnar sig med största sannolikhet också åt ett eller flera sociala medier, där ändamålen ofta innebär att dela med sig av information till andra. Eftersom tekniken Augmented Reality används mer frekvent i några av de största sociala medieapplikationerna blev studiens syfte att undersöka potentiella integritetsproblem med Augmented Reality. Studiens tillvägagångssätt har bestått av en empirisk datainsamling för att skapa ett teoretiskt ramverk för studien. Utifrån detta har det genomförts en digital enkät samt intervjuer för att närmare undersöka användarens beteende online och The Privacy Paradox. Utifrån undersökningens resultat kunde The Privacy Paradox bekräftas och ge en bättre förståelse för hur användaren agerar genom digitala kanaler. I studien behandlas olika aspekter kring integritetsfrågor såsom användarvillkor, sekretessavtal, datamäklare, framtida konsekvenser och vad tekniken möjliggör. Studien kommer fram till att användare, företaget och dagens teknik tillåter att en känsligare information kan utvinnas genom ett dataintrång. Även om det ännu inte har inträffat ett dataintrång som grundat sig i Augmented Reality före denna studie, finns det en risk att det endast handlar om en tidsfråga innan detta sker.
In a time when digitalization is more widespread than ever, the amount of data collected and shared is increasing. As new technologies develop, challenges for privacy concerns arises. An active online user is likely to engage in one or many social media platforms, where the purpose often involves sharing information with others. Since Augmented Reality is more frequently supported in some of the biggest social media applications, the purpose of this study was to investigate potential privacy concerns with Augmented Reality. The study’s approach consisted of an empirical data collection to create a theoretical framework for the study. Based on this, a digital survey and interviews were conducted to further investigate the user's behavior online and The Privacy Paradox. Based on the results of the survey, The Privacy Paradox could be confirmed and a better understanding of how the user interacts through digital channels was achieved. The study treats different aspects of privacy concerns such as user terms, privacy policies, data brokers, future consequences and what technology enables. The study reached the conclusion that users, businesses and today's technology allow a more sensitive type of information to be collected through a data breach. Even if there has not yet occurred a data breach enabled by Augmented Reality prior to this study, there is a risk that it is only a matter of time until this happens.
APA, Harvard, Vancouver, ISO, and other styles
26

Nishibe, Caio Arce. "Central de confrontos para um sistema automático de identificação biométrica: uma abordagem de implementação escalável." Universidade Tecnológica Federal do Paraná, 2017. http://repositorio.utfpr.edu.br/jspui/handle/1/3142.

Full text
Abstract:
Com a popularização do uso da biometria, determinar a identidade de um indivíduo é uma atividade cada vez mais comum em diversos contextos: controle de acesso físico e lógico, controle de fronteiras, identificações criminais e forenses, pagamentos. Sendo assim, existe uma demanda crescente por Sistemas Automáticos de Identificação Biométrica (ABIS) cada vez mais rápidos, com elevada acurácia e que possam operar com um grande volume de dados. Este trabalho apresenta uma abordagem de implementação de uma central de confrontos para um ABIS de grande escala utilizando um framework de computação em memória. Foram realizados experimentos em uma base de dados real com mais de 50 milhões de impressões digitais em um cluster com até 16 nós. Os resultados mostraram a escalabilidade da solução proposta e a capacidade de operar em grandes bases de dados.
With the popularization of biometrics, personal identification is an increasingly common activity in several contexts: physical and logical access control, border control, criminal and forensic identification, payments. Thus, there is a growing demand for faster and accurate Automatic Biometric Identification Systems (ABIS) capable to handle a large volume of biometric data. This work presents an approach to implement a scalable cluster-based matching platform for a large-scale ABIS using an in-memory computing framework. We have conducted some experiments that involved a database with more than 50 million captured fingerprints, in a cluster up to 16 nodes. The results have shown the scalability of the proposed solution and the capability to handle a large biometric database.
APA, Harvard, Vancouver, ISO, and other styles
27

TELES, Heria de Freitas. "Caracterização de ambientes com ocorrência natural Acrocomia aculeata (Jacq.) Lodd. ex Mart e suas populações nas regiões Centro e Sul do Estado de Goiás." Universidade Federal de Goiás, 2009. http://repositorio.bc.ufg.br/tede/handle/tde/2642.

Full text
Abstract:
Made available in DSpace on 2014-07-29T16:24:13Z (GMT). No. of bitstreams: 1 dissertacao final heria.pdf: 1218175 bytes, checksum: 137105a1f3e4866edd482cde6bc19365 (MD5) Previous issue date: 2009-02-27
In the Cerrado, some species of palm trees stand out from the natural, economic, and ecological point of view, either by the predominance, either by exuberance of the plant or importance in the wild fauna and/or flora equilibrium, or even by use of their products and byproducts by the local community. Among these, the macauba (Acrocomia aculeata) occurs in abundance in some states, mainly in Goiás. Increasingly this palm has aroused interest, by its high production of fruits and several uses, such as food, forage, ornamental and oilseed production. And, furthermore, its fruits are highly prized for human consumption, domestic and wild fauna. However, the existing exploitation is basically extractivist and with low productivity. The installation of commercial fields lives together with a series of difficulties, including the lack of knowledge of its ecological requirements. This research aimed to characterize environments of naturally occurring macauba and their respective populations, in the regions Center and South of the State of Goias. Ten areas were studied, located in seven municipalities: Santa Cruz de Goiás, São Miguel do Passa Quatro, São Francisco de Goiás, Parauna, Jandaia, Indiara and Jaraguá. Soil chemical and physical characterizations were carried out, in addition to the description of a brief topossequence description. Climatic data relating to historical series from 1961 to 1990 were obtained, as well as a biometric survey of plants and fruits. According to results, the species occurs in greater density in soils of medium to high fertility. Areas with a predominance of Cambisolos and Neossolos, and with medium texture or sandy clay loam, presented higher plant density. Greater concentration of macauba plants occurs in portions of convex slope, talus and concave slope of topossequences. The macauba develops in soils with base saturation above 50% and high levels of potassium, as evidenced by the presence of muscovite in the areas of occurrence. There is phenotypical variability of the characters studied between plants of macauba of different areas and, in particular, between plants within the area. The population of macauba in the municipality of Jamaica is more productive in terms of number of bunches per plant. Macauba presents both phenologic stages of flowering and fructification, besides bunches of fruit in different stages of development, producing around three to five bunches of fruits per plant in the regions Center and South of the State of Goias. There is no correlation between biometric data of plants and soil fertility variables. Biometric data of fruits have variation between areas, between plants within the area and, mainly, between fruits in trees. The micronutrient iron in the soil is positively correlated with almond average mass and calcium is negatively correlated with number of almonds. The average mass of fruit is positively correlated with across and longitudinal diameters and with the total almond mass. In general, the fruit of macauba presents one to three almonds and is constituted of 23.73% of shell, 33.10% of endocarp, 34.28% of pulp and 8.89% of almond.
No Cerrado, algumas espécies de palmeiras se destacam do ponto de vista natural, econômico e ecológico, seja pela predominância, seja pela exuberância da planta ou importância no equilíbrio da fauna e/ou flora, ou ainda pelo aproveitamento de seus produtos e subprodutos pela comunidade local. Dentre estas, a macaúba (Acrocomia aculeata) ocorre em abundância em alguns Estados, principalmente em Goiás. Cada vez mais esta palmeira tem despertado interesse, pela sua alta produção de frutos e por possuir diversas utilidades, como alimentícias, forrageira, ornamental e oleaginosa. E, ainda, seus frutos são muito apreciados pelo homem, fauna doméstica e silvestre. Porém, a exploração hoje existente é basicamente extrativista e com baixa produtividade. A instalação de lavouras comerciais convive com uma série de dificuldades, incluindo o desconhecimento de suas exigências ecológicas. Este trabalho objetivou caracterizar ambientes de ocorrência natural da macaúba e suas respectivas populações, nas regiões Centro e Sul do Estado de Goiás. Trabalhou-se com dez áreas, locadas em sete municípios: Santa Cruz de Goiás, São Miguel do Passa Quatro, São Francisco de Goiás, Paraúna, Jandaia, Indiara e Jaraguá. Foram realizadas caracterizações química e física do solo; além da descrição da topossequência e sua classificação sucinta. Obteve-se também os dados climáticos relativos à série histórica de 1961 a 1990, além de levantamento de dados biométricos das plantas e frutos. De acordo com os resultados, a espécie ocorre em maior densidade em solos de média a alta fertilidade. Áreas com predomínio de Cambissolos e Neossolos, e com textura média ou franco argilo-arenosa, apresentaram maior densidade de plantas. Ocorre, também, maior concentração de macaubeiras nas porções declive convexo, tálus e declive côncavo da topossequência. A macaúba se desenvolve em solos com saturação de bases acima de 50% e altos níveis de potássio, evidenciado até mesmo pela presença de muscovita nas áreas de ocorrência. Existe variabilidade fenotípica dos caracteres estudados entre plantas de macaúba das diferentes áreas e, especialmente, entre as plantas dentro da área. A população de macaúba da área no município de Jandaia é mais produtiva em termos de número de cachos por planta. A macaúba apresenta simultaneamente as fenofases de floração e frutificação, além de cachos de frutos em diferentes estádios de desenvolvimento, produzindo cerca de três a cinco cachos de frutos por planta nas regiões Centro e Sul do Estado de Goiás. Não há correlação entre os dados biométricos das plantas e as variáveis de fertilidade do solo. Os dados biométricos de frutos possuem variação entre áreas, entre plantas dentro da área e, principalmente, entre frutos no cacho. O micronutriente ferro no solo correlaciona-se positivamente com a massa média de amêndoas e, o cálcio, negativamente com o número de amêndoas. A massa média dos frutos correlaciona-se positivamente com os diâmetros transversal e longitudinal, e com a massa total de amêndoas destes. De forma geral, o fruto de macaúba constitui-se de 23,73% de casca, 33,10% de endocarpo, 34,28% de polpa e 8,89% de amêndoa.
APA, Harvard, Vancouver, ISO, and other styles
28

Maime, Ratakane Baptista. "CHALLENGES AND OPPORTUNITIES OF ADOPTING MANAGEMENT INFORMATION SYSTEMS (MIS) FOR PASSPORT PROCESSING: COMPARATIVE STUDY BETWEEN LESOTHO AND SOUTH AFRICA." Thesis, Central University of Technology, Free State. Business Administration, 2014. http://hdl.handle.net/11462/237.

Full text
Abstract:
Thesis ( M. Tech. (Business Administration )) - Central University of Technology, Free State, 2014
Fast and secure public service delivery is not only a necessity, but a compulsory endeavour. However, it is close to impossible to achieve such objectives without the use of Information Technology (IT). It is correspondingly important to find proper sustainability frameworks of technology. Organisations do not only need technology for efficient public service; the constant upgrading of systems and cautious migration to the newest IT developments is also equally indispensable in today’s dynamic technological world. Conversely, countries in Africa are always lagging behind in technological progresses. Such deficiencies have been identified in the passport processing of Lesotho and South Africa, where to unequal extents, problems related to systems of passport production have contributed to delays and have become fertile grounds for corrupt practices. The study seeks to identify the main impediments in the adoption of Management Information Systems (MIS) for passport processing. Furthermore, the study explores the impact MIS might have in attempting to combat long queues and to avoid long waiting periods – from application to issuance of passports to citizens. The reasonable time frame between passport application and issuance, and specific passport management systems, have been extensively discussed along with various strategies that have been adopted by some of the world’s first movers in modern passport management technologies. In all cases and stages of this research, Lesotho and South Africa are compared. The research approach of the study was descriptive and explorative in nature. As a quantitative design, a structured questionnaire was used to solicit responses in Lesotho and South Africa. It was established that both Lesotho and South Africa have somewhat similar problems – although, to a greater extent, Lesotho needs much more urgent attention. Although the processes of South Africa need to be improved, the Republic releases a passport much faster and more efficiently than Lesotho. Economic issues are also revealed by the study as unavoidable factors that always affect technological developments in Africa. The study reveals that the latest MIS for passport processing has facilitated modern, automated border-control systems and resultant e-passports that incorporate more biometric information of citizens to passports – thanks to modern RFID technologies. One can anticipate that this study will provide simple, affordable and secure IT solutions for passport processing. Key words: Information Technology (IT); Management Information Systems (MIS); E-Government; E-Passport; Biometrics; and RFID.
APA, Harvard, Vancouver, ISO, and other styles
29

Pinto, Allan da Silva 1984. "A countermeasure method for video-based face spoofing attacks : Detecção de tentativas de ataque com vídeos digitais em sistemas de biometria de face." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275616.

Full text
Abstract:
Orientador: Anderson de Rezende Rocha
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-23T22:22:57Z (GMT). No. of bitstreams: 1 Pinto_AllandaSilva_M.pdf: 47523880 bytes, checksum: 072eb0490c26631b80cdcc47d55a4817 (MD5) Previous issue date: 2013
Resumo: O resumo poderá ser visualizado no texto completo da tese digital
Abstract: The complete abstract is available with the full electronic document
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
30

Bekli, Zeid, and William Ouda. "A performance measurement of a Speaker Verification system based on a variance in data collection for Gaussian Mixture Model and Universal Background Model." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20122.

Full text
Abstract:
Voice recognition has become a more focused and researched field in the last century,and new techniques to identify speech has been introduced. A part of voice recognition isspeaker verification which is divided into Front-end and Back-end. The first componentis the front-end or feature extraction where techniques such as Mel-Frequency CepstrumCoefficients (MFCC) is used to extract the speaker specific features of a speech signal,MFCC is mostly used because it is based on the known variations of the humans ear’scritical frequency bandwidth. The second component is the back-end and handles thespeaker modeling. The back-end is based on the Gaussian Mixture Model (GMM) andGaussian Mixture Model-Universal Background Model (GMM-UBM) methods forenrollment and verification of the specific speaker. In addition, normalization techniquessuch as Cepstral Means Subtraction (CMS) and feature warping is also used forrobustness against noise and distortion. In this paper, we are going to build a speakerverification system and experiment with a variance in the amount of training data for thetrue speaker model, and to evaluate the system performance. And further investigate thearea of security in a speaker verification system then two methods are compared (GMMand GMM-UBM) to experiment on which is more secure depending on the amount oftraining data available.This research will therefore give a contribution to how much data is really necessary fora secure system where the False Positive is as close to zero as possible, how will theamount of training data affect the False Negative (FN), and how does this differ betweenGMM and GMM-UBM.The result shows that an increase in speaker specific training data will increase theperformance of the system. However, too much training data has been proven to beunnecessary because the performance of the system will eventually reach its highest point and in this case it was around 48 min of data, and the results also show that the GMMUBM model containing 48- to 60 minutes outperformed the GMM models.
APA, Harvard, Vancouver, ISO, and other styles
31

Riera, Sardà Alexandre. "Computational Intelligence Techniques for Electro-Physiological Data Analysis." Doctoral thesis, Universitat de Barcelona, 2012. http://hdl.handle.net/10803/107818.

Full text
Abstract:
This work contains the efforts I have made in the last years in the field of Electrophysiological data analysis. Most of the work has been done at Starlab Barcelona S.L. and part of it at the Neurodynamics Laboratory of the Department of Psychiatry and Clinical Psychobiology of the University of Barcelona. The main work deals with the analysis of electroencephalography (EEG) signals, although other signals, such as electrocardiography (ECG), electroculography (EOG) and electromiography (EMG) have also been used. Several data sets have been collected and analysed applying advanced Signal Processing techniques. On a later stage Computational Intelligence techniques, such as Machine Learning and Genetic Algorithms, have been applied, mainly to classify the different conditions from the EEG data sets. 3 applications involving EEG and classification are proposed corresponding to each one of the 3 case studies presented in this thesis. Analysis of Electrophysiological signals for biometric purposes: We demonstrate the potential of using EEG signals for biometric purposes. Using the ENOBIO EEG amplifier, and using only two frontal EEG channels, we are able to authenticate subjects with a performance up to 96.6%. We also looked for features extracted from the ECG signals and in that case the performance was equal to 97.9%. We also fused the results of both modalities achieving a perfect performance. Our system is ready to use and since it only uses 4 channels (2 for EEG, 1 for ECG in the left wrist and 1 as active reference in the right ear lobe), the wireless ENOBIO sensor is perfectly suited for our application. EEG differences in First Psychotic Episode (FPE) Patients: From an EEG data set of 15 FPE patients and the same number of controls, we studied the differences in their EEG signals in order to train a classifier able to recognise to which group an EEG sample comes from. The feature we use are extracted from the EEG by computing the Synchronization Likelihood feature between all possible pairs of channels. The next step is to build a graph and from that graph we extracted the Mean Path Length and the Clustering Coefficient. Those features as a function of the connectivity threshold are then used in our classifiers. We then create several classification problems and we reach up to 100% of classification in some cases. Markers of stress in the EEG signal: In this research, we designed a protocol in which the participants where asked to perform different tasks, each one with a different stress level. Among these tasks we can find the Stroop Test, Mathematical arithmetics and also a fake blood sample test. By extracting the alpha asymmetry and the beta/alpha ration, we where able to discriminate between the different tasks with performances up to 88%. This application can be used with only 3 EEG electrodes, and it can also work in real time. Finally this application can also be used as a neurofeedback training to learn how to cope with stress.
Este trabajo contiene los esfuerzos que he realizado en los últimos años en el campo del análisis de datos electro-fisiológicos. La mayor parte del trabajo se ha hecho en Starlab Barcelona SL y otra parte en el Laboratorio de Neurodinámica del Departamento de Psiquiatría y Psicobiología Clínica de la Universidad de Barcelona. La parte central de esta tesis está relacionado con el análisis de la señales de electroencefalografía (EEG), aunque otras señales, tales como electrocardiografía (ECG), electroculografía (EOG) y electromiografía (EMG) también se han utilizado. Varios conjuntos de datos se han recogido y analizado aplicando técnicas avanzadas de procesamiento de señales. En una fase posterior, técnicas de inteligencia computacional, tales como 'Machine Learning' y algoritmos genéticos, se han aplicado, principalmente para clasificar las diferentes condiciones de los conjuntos de datos de EEG. Las 3 aplicaciones, que involucran EEG y técnicas de clasificación, que se presentan en esta tesis son: -Análisis de señales electro-fisiológicas para aplicaciones de biometría -Diferencias en las características del EEG en pacientes de primer brote psicótico -Marcadores de estrés en la señal de EEG
APA, Harvard, Vancouver, ISO, and other styles
32

Grundtman, Per. "Adaptive Learning." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-61648.

Full text
Abstract:
The purpose of this project is to develop a novel proof-of-concept system in attempt to measure affective states during learning-tasks and investigate whether machine learning models trained with this data has the potential to enhance the learning experience for an individual. By considering biometric signals from a user during a learning session, the affective states anxiety, engagement and boredom will be classified using different signal transformation methods and finally using machine-learning models from the Weka Java API. Data is collected using an Empatica E4 Wristband which gathers skin- and heart related biometric data which is streamed to an Android application via Bluetooth for processing. Several machine-learning algorithms and features were evaluated for best performance.
APA, Harvard, Vancouver, ISO, and other styles
33

Nytorpe, Piledahl Staffan, and Daniel Dahlberg. "Detektering av stress från biometrisk data i realtid." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31248.

Full text
Abstract:
At the time of writing, stress and stress related disease have become the most common reasons for absence in the workplace in Sweden. The purpose of the work presented here is to identify and notify people managing unhealthy levels of stress. Since symptoms of mental stress manifest through functions of the Sympathetic Nervous System (SNS), they are best measured through monitoring of SNS changes and phenomena. In this study, changes in the sympathetic control of heart rate were recorded and analyzed using heart rate variability analysis and a simple runner’s heart rate sensor connected to a smartphone. Mental stress data was collected through stressful video gaming. This was compared to data from non-stressful activities, physical activity and extremely stressful activities such as public speaking events. By using the period between heartbeats and selecting features from the frequency domain, a simple machine learning algorithm could differentiate between the types of data and thus could effectively recognize mental stress. The study resulted in a collection of 100 data points, an algorithm to extract features and an application to continuously collect and classify sequences of heart periods. It also revealed an interesting relationship in the data between different subjects. The fact that continuous stress monitoring can be achieved using minimally intrusive sensors is the greatest benefit of these results, especially when connsidering its potential value in the identification and prevention of stress related disease.
APA, Harvard, Vancouver, ISO, and other styles
34

葉英傑 and Ying-Kit David Ip. "Analysis of clustered grouped survival data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31226127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ip, Ying-Kit David. "Analysis of clustered grouped survival data /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2353011x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Maghsoudi, Javid. "A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones." Thesis, Pace University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10690910.

Full text
Abstract:

This is a study of the behavioral biometric of smartphone motion to determine the potential accuracy of authenticating users on smartphone devices. The study used the application Sensor Kinetics Pro and the Weka machine-learning library to analyze accelerometer and gyroscope data. The study conducted three experiments for the research. They were conducted in spring 2015, fall 2015, and spring 2016. The final experiment in spring 2016 used six Android-based smartphones to capture data from 60 participants and each participant performed 20 trials of two motions: bringing the phone up to eye level for review, and then bringing the phone to the ear, resulting in 1200 runs. The resulting sensor datasets were used for machine learning training and testing. The study used filtering data to remove noise, and then aggregated the data and used them as inputs to the Weka Machine Learning tool. The study used several machine classification algorithms: the Multilayer Perception (MLP), k-Nearest Neighbor (k-NN), Naïve Bayes (N-B), and Support Vector Machine (SVM) machine learning classification algorithms. The study reached authentication accuracies of up to 93% thus supporting the use of behavioral motion biometrics for user authentication. Preliminary studies with smaller numbers of participants in spring 2015 and in fall 2015 also produced 90%+ authentication accuracy.

APA, Harvard, Vancouver, ISO, and other styles
37

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "GMS Medizinische Informatik, Biometrie und Epidemiologie." German Medical Science, 2005. https://ul.qucosa.de/id/qucosa%3A12911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

McClelland, Robyn L. "Regression based variable clustering for data reduction /." Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/9611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Savaluny, Elly. "Analysis of ordered categorical data : partial proportional odds and stratified models." Thesis, University of Reading, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Stoner, Julie Ann. "Analysis of clustered data : a combined estimating equations approach /." Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/9594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

梁翠蓮 and Tsui-lin Leung. "Proportional odds model for survival data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B42575011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Leung, Tsui-lin. "Proportional odds model for survival data." Click to view the E-thesis via HKUTO, 1999. http://sunzi.lib.hku.hk/hkuto/record/B42575011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Liu, Fei, and 劉飛. "Statistical inference for banding data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B41508701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Liu, Fei. "Statistical inference for banding data." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41508701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ulmer. "Biometrie und Informatik in Medizin und Biologie." Fischer, 1991. https://ul.qucosa.de/id/qucosa%3A12649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie (GMDS). "Biometrie und Informatik in Medizin und Biologie." Fischer, 2014. https://ul.qucosa.de/id/qucosa%3A12566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zhou, Feifei, and 周飞飞. "Cure models for univariate and multivariate survival data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45700977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hartung, Karin. "Biometrical approaches for analysing gene bank evaluation data on barley (Hordeum spec.)." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:100-opus-2251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Yau-wing. "Modelling multivariate survival data using semiparametric models." Click to view the E-thesis via HKUTO, 2000. http://sunzi.lib.hku.hk/hkuto/record/B4257528X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Baraldi, Carlo. "La sicurezza dei dati biometrici nella firma grafometrica. Aspetti giuridici e tecnologici." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6682/.

Full text
Abstract:
La firma grafometrica è la sottoscrizione autografa eseguita con uno stilo elettronico su un dispositivo di acquisizione digitale e rappresenta ad oggi nel panorama delle tipologie di firma elettroniche una realtà a tutti gli effetti realizzabile. Questa tipologia di firma elettronica fonda il proprio valore sulle caratteristiche di universalità, unicità, permanenza e collezionabilità dei dati biometrici. Il successo della firma grafometrica è da ricercare invece nella sua stessa natura di firma, in quanto l'uomo da sempre è stato abituato ad eseguire il gesto dell'apposizione della propria firma autografa a dichiarazione della propria volontà. La profonda informatizzazione degli ultimi anni e la recente normativa hanno quindi permesso di trasferire la semplicità di questo gesto dal contesto analogico a quello digitale. I vantaggi derivanti dall'utilizzo della firma grafomentrica sono molteplici: innanzitutto il suo utilizzo comporta la completa dematerializzazione della gestione documentale aziendale con considerevoli risparmi dati dall'annullamento dei costi di stampa ed archiviazione dei documenti stessi, comporta inoltre una maggiore velocità di esecuzione dei processi documentali (dalla realizzazione dei documenti alla ricerca degli stessi) ed infine rende possibile l’ottenimento di documenti già predisposti per la conservazione a norma (con conseguente mantenimento della validità legale nel tempo). Come conseguenza di questa trasposizione dall'analogico al digitale si sono presentate tuttavia problematiche derivanti dalla natura stessa del nuovo contesto; la realizzazione di soluzioni di firma grafometrica richiede quindi una forte attenzione, al fine di evitare che i dati biometrici possano essere utilizzati impropriamente. Questa tesi è quindi volta a descrivere sia a livello normativo che tecnologico questa tipologia di firma elettronica avanzata. Nel corso della trattazione verranno inoltre fornite delle linee guida per la realizzazione di un corretto processo di apposizione della firma grafometrica a tutela della sicurezza dei dati biometrici dell'individuo.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography